Deakin University
Browse

File(s) under permanent embargo

Secure mobile RFID ownership transfer protocol to cover all transfer scenarios

conference contribution
posted on 2012-01-01, 00:00 authored by Biplob Ray, Morshed ChowdhuryMorshed Chowdhury, Jemal AbawajyJemal Abawajy
Existing business models require RFID tag to transfer its ownership during its life cycle. As a result, a RFID tags might have many owners during its life cycle. However, the transfer of ownership should ensure that previous owners have no information about current owner's data. Physical ownership does not ensure digital ownership transfer given the wireless nature of communication with RFID tags. Most of the proposed protocol in this nature is implacable to address aU existing RFID tag ownership transfer scenarios. Moreover, they have many security concerns and vulnerabilities. In this paper, we have investigated and discussed all existing business cases and their transfer scenarios. To cover all ownership transfer scenarios, we have presented an ownership transfer protocol. The proposed protocol has used modified DiffieHellman algorithm to perform ownership request validation and authentication of involved parties. Performance comparison shows that our protocol is practical to implement passive low-cost RFID tags, securely performs tag ownership transfer and can be used for all existing ownership transfer scenarios.

History

Event

Computing and Convergence Technology. Conference (7th : 2012 : Seoul, Korea)

Pagination

1185 - 1192

Publisher

IEEE

Location

Seoul, Korea

Place of publication

Piscataway, N.J.

Start date

2012-12-03

End date

2012-12-05

ISBN-13

9788994364216

ISBN-10

8994364218

Language

eng

Publication classification

E1 Full written paper - refereed

Copyright notice

2012, IEEE

Editor/Contributor(s)

K Kwack, S Kawata, S Hwang, D Han, F Ko

Title of proceedings

ICCCT 2012 : Proceeding of the 7th International Conference on Computing and Convergence Technology